Skip to content

Add payload signature requirement to content-publisher #1032

@JoeCap08055

Description

@JoeCap08055

Description

Currently, content-publishing-api accepts any valid payload for posting/announcement content to the chain. The only "authorization" done is to verify that, if the payload is on behalf of a single MSA, that MSA is validated to have an active delegation for the indicated Intent to the Gateway provider MSA. However, there is no validation done that the incoming request was actually originated by the owner of the MSA.

The assumption had been that Gateway would be an internal service serving a Provider's backend application, and so relied on network security. This is a flawed (or at least insufficient) security model.

A better model would be to have payloads signed & signatures checked by Gateway before accepting them. Payloads could potentially be signed by:

  • The originating MSA
  • The Gateway Provider account
  • A Provider account with an active delegation from the indicated MSA
  • A "whitelisted" Provider account

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions